Cyber attacks and security breaches : coping with external threats.
(eVideo)

Book Cover
Average Rating
Contributors
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Physical Desc
1 online resource (1 video file, approximately 26 min.) : digital, .flv file, sound
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Format
eVideo
Language
English

Notes

General Note
Title from title frames.
Date/Time and Place of Event
Originally produced by SmartPros in 2012.
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics for Access Data, offers expert advice and best practices that will help IT professionals keep their networks safe and secure. Track: Technical briefings. In-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of external network security threats today. Explain the techniques and methodologies being utilized by attackers. Understand how to reduce the risk of an external cyber-attack. Identify best practices that will help organizations keep their networks safe and secure.
System Details
Mode of access: World Wide Web.

Citations

APA Citation, 7th Edition (style guide)

(2014). Cyber attacks and security breaches: coping with external threats . Kanopy Streaming.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

2014. Cyber Attacks and Security Breaches: Coping With External Threats. Kanopy Streaming.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Cyber Attacks and Security Breaches: Coping With External Threats Kanopy Streaming, 2014.

MLA Citation, 9th Edition (style guide)

Cyber Attacks and Security Breaches: Coping With External Threats Kanopy Streaming, 2014.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
724f2f04-690b-cb58-18fa-661faf1dfe1d-eng
Go To Grouped Work

Grouping Information

Grouped Work ID724f2f04-690b-cb58-18fa-661faf1dfe1d-eng
Full titlecyber attacks and security breaches coping with external threats
Authorkanopy
Grouping Categorymovie
Last Update2022-07-12 21:16:40PM
Last Indexed2024-03-28 03:55:09AM

Book Cover Information

Image Sourcesideload
First LoadedDec 21, 2020
Last UsedJan 23, 2024

Marc Record

First DetectedFeb 04, 2014 12:00:00 AM
Last File Modification TimeAug 01, 2021 04:45:15 AM

MARC Record

LEADER02364ngm a22003851i 4500
001kan1089883
003CaSfKAN
00520140204133419.0
006m     o  c        
007vz uzazuu
007cr una---unuuu
008140807p20142012cau025        o   vleng d
02852|a 1089883|b Kanopy
035 |a (OCoLC)897770048
040 |a UtOrBLW|b eng|e rda|c UtOrBLW
24500|a Cyber attacks and security breaches :|b coping with external threats.
264 1|a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2014.
300 |a 1 online resource (1 video file, approximately 26 min.) :|b digital, .flv file, sound
336 |a two-dimensional moving image|2 rdacontent
337 |a computer|2 rdamedia
338 |a online resource|2 rdacarrier
344 |a digital
347 |a video file|b MPEG-4|b Flash
500 |a Title from title frames.
518 |a Originally produced by SmartPros in 2012.
520 |a On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics for Access Data, offers expert advice and best practices that will help IT professionals keep their networks safe and secure. Track: Technical briefings. In-depth information on new technologies, techniques and solution providers. Learning objectives: Understand the nature of external network security threats today. Explain the techniques and methodologies being utilized by attackers. Understand how to reduce the risk of an external cyber-attack. Identify best practices that will help organizations keep their networks safe and secure.
538 |a Mode of access: World Wide Web.
650 0|a Business enterprises|x Computer networks|x Security measures.
650 0|a Computer science.
650 0|a Economics.
650 0|a Cyberterrorism.
650 0|a Computer crimes.
7102 |a Kanopy (Firm)
85640|u https://pueblolibrary.kanopy.com/node/89884|z A Kanopy streaming video
85642|z Cover Image|u https://www.kanopy.com/node/89884/external-image